Sciweavers

669 search results - page 81 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ICSE
2009
IEEE-ACM
14 years 7 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
VLDB
2002
ACM
84views Database» more  VLDB 2002»
14 years 9 months ago
Advanced Database Technologies in a Diabetic Healthcare System
With the increased emphasis on healthcare worldwide, the issue of being able to efficiently and effectively manage large amount of patient information in diverse medium becomes cr...
Wynne Hsu, Mong-Li Lee, Beng Chin Ooi, Pranab Kuma...
DSN
2007
IEEE
15 years 4 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
EUROMICRO
2003
IEEE
15 years 3 months ago
Key Decisions in Strategic New Product Development for Small Software Product Businesses
Small companies in the software product business risk rework and market failure due to shortcomings in integrating a strategic perspective into management of product development. ...
Jarno Vähäniitty
CSFW
2010
IEEE
15 years 1 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu